Analysis Overview
SHA256
0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88
Threat Level: Known bad
The file 0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88 was found to be: Known bad.
Malicious Activity Summary
Modifies WinLogon for persistence
NanoCore
Drops file in Drivers directory
Checks whether UAC is enabled
Suspicious use of SetThreadContext
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-26 23:15
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-26 23:15
Reported
2022-11-27 16:59
Platform
win7-20220812-en
Max time kernel
152s
Max time network
157s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\NlwMFXEVNkpPcY8n\\CUsl3ekpMaOc.exe\",explorer.exe" | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
NanoCore
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\drivers\etc\hosts | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1364 set thread context of 1292 | N/A | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
Files
memory/1364-54-0x0000000076071000-0x0000000076073000-memory.dmp
memory/1364-55-0x0000000074790000-0x0000000074D3B000-memory.dmp
memory/1364-56-0x0000000074790000-0x0000000074D3B000-memory.dmp
memory/1292-57-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-58-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-60-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-61-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-62-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-63-0x000000000041E792-mapping.dmp
memory/1292-65-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-67-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1292-69-0x0000000074790000-0x0000000074D3B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-26 23:15
Reported
2022-11-27 17:00
Platform
win10v2004-20221111-en
Max time kernel
170s
Max time network
192s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\NlwMFXEVNkpPcY8n\\xOWwQuOtHOZL.exe\",explorer.exe" | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
NanoCore
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\drivers\etc\hosts | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4308 set thread context of 2216 | N/A | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe
"C:\Users\Admin\AppData\Local\Temp\0f3cf0fa1f66dbf9dfdb4df263777cd970ffb085e94ac0a3285bd40c2b445a88.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.247.211.126:80 | tcp | |
| N/A | 20.189.173.12:443 | tcp | |
| N/A | 8.238.21.126:80 | tcp | |
| N/A | 93.184.220.29:80 | tcp | |
| N/A | 8.238.21.126:80 | tcp | |
| N/A | 8.238.21.126:80 | tcp | |
| N/A | 8.238.21.126:80 | tcp | |
| N/A | 104.80.225.205:443 | tcp | |
| N/A | 8.238.21.126:80 | tcp | |
| N/A | 52.242.97.97:443 | tcp | |
| N/A | 8.8.8.8:53 | 96.108.152.52.in-addr.arpa | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.8.8:53 | appleassist.mooo.com | udp |
| N/A | 8.8.4.4:53 | appleassist.mooo.com | udp |
Files
memory/4308-132-0x0000000074FF0000-0x00000000755A1000-memory.dmp
memory/4308-133-0x0000000074FF0000-0x00000000755A1000-memory.dmp
memory/3868-134-0x0000000000000000-mapping.dmp
memory/332-135-0x0000000000000000-mapping.dmp
memory/2216-136-0x0000000000000000-mapping.dmp
memory/2216-137-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2216-138-0x0000000074FF0000-0x00000000755A1000-memory.dmp
memory/2216-139-0x0000000074FF0000-0x00000000755A1000-memory.dmp